infosec
Glossary terms from module 2 | Coursera
https://www.coursera.org/learn/manage-security-risks/supplement/vnksq/glossary-terms-from-module-2
Assessment & Auditing Resources | NIST
https://www.nist.gov/cyberframework/assessment-auditing-resources
General
Google Cybersecurity Certificate Course
https://www.coursera.org/learn/manage-security-risks/home/
What’s the Diff: 3-2-1 vs. 3-2-1-1-0 vs. 4-3-2
https://www.backblaze.com/blog/whats-the-diff-3-2-1-vs-3-2-1-1-0-vs-4-3-2/
Learn about the differences between data backup strategies and which is best for you.
IT Disaster Recovery Plan | Ready.gov
https://www.ready.gov/it-disaster-recovery-plan
IT Recovery IT Disaster Recovery Plan Data Backup Data Backup Plan Resources
What are the PCI Compliance Fines and Penalties? - PCI DSS GUIDE
https://www.pcidssguide.com/what-are-the-pci-compliance-fines-and-penalties/
You'll hear about PCI compliance fines, which can vary from $ 5,000 to $ 100,000 a month depending on the size of the company and the duration and scope of your non-compliance.
https://www.lepide.com/risk-assessment-sample.pdf
https://www.lepide.com/risk-assessment-sample.pdf
PCI Compliance for Small Business: 2023 Guide
https://fitsmallbusiness.com/pci-compliance-for-small-businesses/
If you accept credit cards, learn about PCI compliance for small business, including guidelines for encrypting data and testing security.
Cybersecurity for Small Businesses | Federal Communications Commission
https://www.fcc.gov/communications-business-opportunities/cybersecurity-small-businesses
The Internet allows businesses of all sizes and from any location to reach new and larger markets and provides opportunities to work more efficiently by using computer-based tools. Whether a company is thinking of adopting cloud computing or just using email and maintaining a website, cybersecurity should be a part of the plan. Theft of digital information has become the most commonly reported fraud, surpassing physical theft. Every business that uses the Internet is responsible for creating a culture of security that will enhance business and consumer confidence.
How to Perform a Cybersecurity Audit: A 3-Step Guide | UpGuard
https://www.upguard.com/blog/how-to-perform-a-cybersecurity-audit
Official PCI Security Standards Council Site - Verify PCI Compliance, Download Data Security and Credit Card Security Standards
https://www.pcisecuritystandards.org/merchants/
A global forum that brings together payments industry stakeholders to develop and drive adoption of data security standards and resources for safe payments.
Cyber Security Audits: Benefits, Best Practices & Checklist
https://www.knowledgehut.com/blog/security/cyber-security-audit#what-is-auditing-in-cyber-security?%C2%A0
A cybersecurity audit ensures that your controls are working properly by systematically examining your cyber security. Know more about cyber security audits in this article.
Quickstart · Wazuh documentation
https://documentation.wazuh.com/current/quickstart.html
User manual, installation and configuration guides. Learn how to get the most out of the Wazuh platform.
Home Lab Setup | Building an Effective Cybersecurity Learning Environment
https://www.cover6solutions.com/home-lab-setup/
Having a home or online lab is crucial for the advancement of your career in information security (#infosec). It is also a great way to gain hands-on experience…
Building an Enterprise Grade Home Lab | SANS Institute
https://www.sans.org/webcasts/building-enterprise-grade-home-lab-113730/
A Visual Summary of SANS Ransomware Summit 2023
https://www.sans.org/blog/a-visual-summary-of-sans-ransomware-summit-2023/
A Simple Elastic SIEM Lab. In this guide, I’ll walk you through… | by Abdullahi Ali | Medium
https://medium.com/@aali23/a-simple-elastic-siem-lab-6765159ee2b2
12 Best Syslog Server Tools for Windows & Linux 2023
https://www.comparitech.com/net-admin/best-free-syslog-servers-for-linux-and-windows/
What you need to know about the most powerful Syslog servers for Windows & Linux. Keep track of events on your network. Free + Paid downloads.
don-ferris/Professional-Documents
https://github.com/don-ferris/Professional-Documents
Free Cybersecurity Services and Tools | CISA
https://www.cisa.gov/resources-tools/resources/free-cybersecurity-services-and-tools
gcat_threathorizons_full_sept2022.pdf
https://services.google.com/fh/files/blogs/gcat_threathorizons_full_sept2022.pdf
faq/breaking_in - cybersecurity
https://www.reddit.com/r/cybersecurity/wiki/faq/breaking_in#wiki_what_is_the_most_important_thing_to_know_before_pursuing_cybersecurity.3F
What is a Cybersecurity Framework? — RiskOptics
https://reciprocity.com/resources/what-is-a-cybersecurity-framework/
In an age where our personal, professional, and even political spheres are intricately intertwined with the digital realm, the protection of our cyber environments has never been more critical. From large multinational corporations to individual smartphone users, everyone is vulnerable to the increasingly sophisticated world of cyber threats. Yet, while most people are somewhat aware […]
What is Continuous Monitoring in Cybersecurity? — RiskOptics
https://reciprocity.com/resources/what-is-continuous-monitoring-in-cybersecurity/
As organizations increasingly rely on technology for their day-to-day operations, the need for robust information security measures has become more critical than ever. Cybersecurity risks have risen, and it is essential for CISOs to implement strategies that ensure real-time monitoring of threats to prevent data breaches. This is where continuous monitoring comes in. Continuous monitoring […]
Foundations of Cybersecurity - Discussions | Coursera
https://www.coursera.org/learn/foundations-of-cybersecurity/discussions/
(5) EP000: Operation Aurora | HACKING GOOGLE - YouTube
https://www.youtube.com/watch?v=przDcQe6n5o&list=PL590L5WQmH8dsxxz7ooJAgmijwOz0lh2H&index=3&t=5s
HACKING GOOGLE – what happens when a country attacks a company? In 2009, Google found out and cybersecurity was never the same again. An inside look at the h...
Building a budget cybersecurity homelab in Proxmox Virtual Environment – Remote Explorations
https://emhedge5.wordpress.com/2023/06/10/cybersecurity-homelab-build-proxmox-ve-pfsense/
After gaining my CompTIA Security+ certification, I was on cloud nine, assuming I was on the precipice of a cybersecurity career. All that remained was to gain some practical experience--to get my hands dirty with a homelab and show off some of the knowledge I obtained over the previous months' learning. Oh, sweet summer child...